This is a Trojan detection. Unlike viruses, Trojans do not self-replicate. They are spread manually, often under the premise that they are beneficial or wanted. The most common installation methods involve system or security exploitation, and unsuspecting users manually executing unknown programs. Distribution channels include e-mail, malicious or hacked Web pages, Internet Relay Chat (IRC), peer-to-peer networks, etc
Kaspersky - Exploit.Java.CVE-2012-0507.fk
Microsoft - Exploit:Java/CVE-2012-0507.CT
Avira - EXP/10-0840.AW.2
Indication of Infection
The exploit may download arbitrary files.
This exploit attempts to download and execute additional malware to the infected system.
Methods of Infection
This threat exploits an unpatched vulnerability in Sun Microsystems Java.
This Trojan can be installed while browsing compromised websites.